How do we keep hackers away from our Social Media Accounts?

As days go by, we share our lives on social media more and we adopt these platforms as a part of our lives. However, some malicious people can get bored if your accounts are infested. At this point, I will tell you about the best methods of protecting your accounts.

When I refer to social media, my mind is definitely coming first on Facebook and Twitter. Although the platforms that have emerged in recent times have multiplied and even gained in popularity, almost all of us have Facebook and Twitter accounts. On the other hand, these media pages, where we share our lives, can sometimes contain very important information for us.

But it seems to me that we have seen so much that malicious people have been haunted by these idioms. So what should we do to protect our accounts from the hackers' woes? Here at this point, thanks to the methods I will talk to you in a moment, your account will be as secure as ever.

1. Make sure to use the lock screen of your device

If you are not happy with the use of your device and your accounts outside of your own knowledge, we strongly recommend you get help from the lock screen. You will be protected from curious parents and malicious people thanks to the display that you have stopped using and your device will be locked. This method, which you can also protect from physical attacks, is important to protect your device even if it is not advanced. On the other hand, it is also important to note that the cipher you choose will not be your birth date.

2. Predictable password and two factor authentication

Choosing a strong password and using two factor authentication is certainly the two most important things you can do. I know you've heard this a lot before, but the easiest way to get into someone's account is by getting leaked information and trying different password combinations. If we think we have accounts in many places, using a different password for each page will definitely work. On the other hand, combinations of upper and lower case letters, punctuation marks and numbers can add power to your strength.

If you come to two factor authentication, things are a little better for you. In this context, even if the attacker knows your cipher, a second device (usually your smartphone) will not be able to pass through the control system and your account will remain secure. Go to Settings-> Security & Access-> Two-Factor Authentication for a setting that you can apply quite easily and then increase your security significance one more time.

With this method you will apply your password to your account from another device you will still need the confirmation code that came with your phone. A similar situation exists on Twitter. You can also go to the Settings and Privacy-> Account section on your Twitter account for the same method. My suggestion is for you to use two-factor authentication, though you might think you choose strong passwords

3. Remote control

One of your Facebook accounts has broken all the hurdles and you have not noticed the situation in any way. At this point you have an option on your Facebook account that you can see and follow. You can see the time and place of the entry under the Settings-> Security and Access tab. If you see an interaction that you do not recognize, it will be effective to remove this device from use and then change your password. On the other hand, it is worth mentioning that Twitter does not have this kind of feature.

4. Limit third-party permissions

An attacker may also leak accounts from third-party applications that you have access to. This is not so easy if you look at it, but of course it is worth paying attention. At this point, it will be useful to remove attachments that you no longer need from your listener. Although the incident is not a complete hacking attempt, your account and information may be collected by invaders or agencies. You can follow Settings-> Applications and Internet Sites for this and remove applications you do not want. In a similar situation you can also access to Twitter. For this, it will suffice to follow the Settings-> Applications tabs.

5. Take a look at the permissions you give your device

As you know, after we upload the applications, we allow a full service. At this point, you may be able to check your permissions on your device.

On Android: Go to Settings-> Applications and then click on Application permissions in the top right-hand menu icon

If you are using iOS Go to Settings:> Privacy and see the permissions you have given by clicking on the application.


            Hackers use 8 Operating System

If you pay attention to all these methods, you can use your account with peace of mind. Are there any security measures you use other than these?